Bachelor of Science in Cybersecurity


Accredited by the UAE Ministry of Education

In RIT’s Cybersecurity degree you’ll learn to preserve assets, identify security vulnerabilities, prove threats occurred, and design strategies for data recovery.

Overview

As technology advances at a rapid rate, protecting individuals, companies, government entities and global organizations from cyber threats is becoming a huge sector, with career opportunities spanning the globe. Our Bachelor of Science in Cybersecurity has been designed to prepare you to excel in this rapidly growing area. If you love computer science, crave a program that offers a hands-on curriculum and a range of active learning experiences and gives plenty of opportunities for independent exploration at an advanced level, the Bachelor of Science in Cybersecurity will be a perfect.

Considered a leading program in computing and network security and forensics by industry experts including the U.S. Department of Homeland Security, the Department of Defense and the National Security Agency, the degree offers you a high level of specialization beyond what is provided by more general majors in Information Systems or Information Technology. You’ll begin by getting to grips with a wide breadth of computing disciplines including programming, scripting, databases, computing security, cryptography, security policy, networks, systems and network administration. You’ll then have the chance to focus on a particular area of security such as forensics, mobile device forensics or network/computing system security. By the time you graduate you will be an expert in the identification of computer security vulnerabilities, the detection of computer security exploits, and the prevention or mitigation of the resulting attack, making you highly employable. Your job responsibilities may include security assessment, cybersecurity, network security, computer and network forensics, cryptography, penetration testing, information security risk management, and cyber policy & law.

Typical Job Titles

Assistant Reverse Engineer Application Security Engineer
Cyber Security Analyst Cyber Threat Responder
Security Software Specialist Penetration Tester
Security Assurance Engineer Security Consultant
Site Reliability Engineer Threat Analyst
Technical Assessments Consultant Vehicle Cybersecurity Engineer

 

Industries


Health Care


Government


Medical Devices


Electronic and Computer Hardware


Utilities and Renewable Energy


Internet and Software


Telecommunications

Mission Statement

The mission of the Cybersecurity program is to advance the state of the art in cybersecurity knowledge and provide world-class education in the knowledge, skills, and mindset needed to have a great career as a cybersecurity professional.

Program Educational Objectives

The Cybersecurity Program Educational Objectives (PEO) are broad statements that describe what graduates are expected to attain within a few years of graduation. Program educational objectives are based on the needs of the program’s constituencies. The Cybersecurity faculty, in conjunction with its constituents, has established the following program educational objectives:

  • PEO 1: Graduates will be employable in cyber security and cyber forensics professional positions in both the private and public sectors.
  • PEO 2: Graduates will have appropriate foundational skills to become lifelong learners within their field.
  • PEO 3: Graduates will be prepared to work as team members and to adopt leadership positions as necessary.
  • PEO 4: Graduates will be prepared for

Program Learning Outcomes

  • Analyze a complex computing problem and to apply principles of computing and other relevant disciplines to identify solutions.
  • Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements in the context of the program’s disciplines.
  • Communicate effectively in a variety of professional contexts.
  • Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles.
  • Function effectively as a member or leader of a team engaged in activities appropriate to the program’s discipline.
  • Apply security principles and practices to the environment, hardware, software, and human aspects of a system.
  • Assess the ethical ramifications of working in the security field

Curriculum

Students are required to complete 126 semester credit hours of core courses and advanced courses as well as cooperative education. Core courses include a programming sequence, an ethics course, a computer networking and system administration sequence, and foundation courses in computer and network security. Advanced courses allow students to design the focus of their information security coursework.

Typical Course Sequence

Total Credit Hours - 126

Course Sem. Cr. Hrs.
First Year
CSEC-140
Introduction to Cybersecurity
This course will introduce many fundamental cybersecurity concepts. The course will teach students to think about information systems using an adversarial mindset, evaluate risk to information systems, and introduce controls that can be implemented to reduce risk. Topics will include authentication systems, data security and encryption, risk management and security regulatory frameworks, networking and system security, application security, organizational and human security considerations, and societal implications of cybersecurity issues. These topics will be discussed at an introductory level with a focus on applied learning through hands-on virtual lab exercises.
3
GCIS-123
Software Development and Problem Solving I
A first course introducing students to the fundamentals of computational problem solving. Students will learn a systematic approach to problem solving, including how to frame a problem in computational terms, how to decompose larger problems into smaller components, how to implement innovative software solutions using a contemporary programming language, how to critically debug their solutions, and how to assess the adequacy of the software solution. Additional topics include an introduction to object-oriented programming and data structures such as arrays and stacks. Students will complete both in-class and out-of-class assignments.
4
GCIS-124
Software Development and Problem Solving II
A second course that delves further into computational problem solving, now with a focus on an object-oriented perspective. There is a continued emphasis on basic software design, testing & verification, and incremental development. Key topics include theoretical abstractions such as classes, objects, encapsulation, inheritance, interfaces, polymorphism, software design comprising multiple classes with UML, data structures (e.g. lists, trees, sets, maps, and graphs), exception/error handling, I/O including files and networking, concurrency, and graphical user interfaces. Additional topics include basic software design principles (coupling, cohesion, information expert, open-closed principle, etc.), test driven development, design patterns, data integrity, and data security.
4
UWRT-150
FYW: Writing Seminar
Writing Seminar is a three-credit course limited to 19 students per section. The course is designed to develop first-year students’ proficiency in analytical and rhetorical reading and writing, and critical thinking. Students will read, understand, and interpret a variety of non-fiction texts representing different cultural perspectives and/or academic disciplines. These texts are designed to challenge students intellectually and to stimulate their writing for a variety of contexts and purposes. Through inquiry-based assignment sequences, students will develop academic research and literacy practices that will be further strengthened throughout their academic careers. Particular attention will be given to the writing process, including an emphasis on teacher-student conferencing, critical self-assessment, class discussion, peer review, formal and informal writing, research, and revision. Small class size promotes frequent student-instructor and student-student interaction. The course also emphasizes the principles of intellectual property and academic integrity for both current academic and future professional writing.
3
MATH-181
Calculus I
This is the first in a two-course sequence intended for students majoring in mathematics, science, or engineering. It emphasizes the understanding of concepts, and using them to solve physical problems. The course covers functions, limits, continuity, the derivative, rules of differentiation, applications of the derivative, Riemann sums, definite integrals, and indefinite integrals.
4
MATH-182
Calculus II
This is the second in a two-course sequence. It emphasizes the understanding of concepts, and using them to solve physical problems. The course covers techniques of integration including integration by parts, partial fractions, improper integrals, applications of integration, representing functions by infinite series, convergence and divergence of series, parametric curves, and polar coordinates.
4
MATH-190
Discrete Mathematics for Computing
This course introduces students to ideas and techniques from discrete mathematics that are widely used in Computer Science. Students will learn about the fundamentals of propositional and predicate calculus, set theory, relations, recursive structures and counting. This course will help increase students’ mathematical sophistication and their ability to handle abstract problems.
NSSA-241
Introduction to Routing and Switching
This course provides an introduction to wired network infrastructures, topologies, technologies, and the protocols required for effective end-to-end communication. Basic security concepts for TCP/IP based technologies are introduced. Networking layers 1, 2, and 3 are examined in-depth using the International Standards Organization’s Open Systems Interconnection and TCP/IP models as reference. Course topics focus on the TCP/IP protocol suite, the Ethernet LAN protocol, switching technology, and routed and routing protocols common in TCP/IP networks. The lab assignments mirror the lecture content , providing an experiential learning component for each topic covered.
YOPS-010
RIT 365: RIT Connections
RIT 365 students participate in experiential learning opportunities designed to launch them into their career at RIT, support them in making multiple and varied connections across the university, and immerse them in processes of competency development. Students will plan for and reflect on their first-year experiences, receive feedback, and develop a personal plan for future action in order to develop foundational self-awareness and recognize broad-based professional competencies.
0
General Education - Artistic Perspective A : Islamic Culture Course 3
Second Year
CSEC-201
Programming for Information Security
This course builds upon basic programming skills to give students the programming knowledge necessary to study computing security. Students will be introduced to network programming, memory management, and operating system calls along with associated security concepts. Specific focus will placed on understanding the compilation process and on the relation between high-level programming concepts and low-level programming concepts, culminating in identifying and exploiting memory corruption vulnerabilities.
3
MATH-251
Probability and Statistics
This course introduces sample spaces and events, axioms of probability, counting techniques, conditional probability and independence, distributions of discrete and continuous random variables, joint distributions (discrete and continuous), the central limit theorem, descriptive statistics, interval estimation, and applications of probability and statistics to real-world problems. A statistical package such as Minitab or R is used for data analysis and statistical applications.
3
CSEC-202
Reverse Engineering Fundamentals
This course will teach students the core concepts needed to analyze unknown source code. Students will study a variety of low-level programming languages and how high-level programming language structures relate to low-level programming languages. Students will learn study tools and techniques used for both static and dynamic analysis of unknown binaries, providing the foundation for further study in malware analysis.
3
NSSA-221
Systems Administration I
This course is designed to give students an understanding of the role of the system administrator in large organizations. This will be accomplished through a discussion of many of the tasks and tools of system administration. Students will participate in both a lecture section and a separate lab section. The technologies discussed in this class include: operating systems, system security, and service deployment strategies.
MATH-241
Linear Algebra
This course is an introduction to the basic concepts of linear algebra, and techniques of matrix manipulation. Topics include linear transformations, Gaussian elimination, matrix arithmetic, determinants, vector spaces, linear independence, basis, null space, row space, and column space of a matrix, eigenvalues, eigenvectors, change of basis, similarity and diagonalization. Various applications are studied throughout the course.
3
PHYS-211
University Physics I
This is a course in calculus-based physics for science and engineering majors. Topics include kinematics, planar motion, Newton's Laws, gravitation, work and energy, momentum and impulse, conservation laws, systems of particles, rotational motion, static equilibrium, mechanical oscillations and waves, and data presentation/analysis. The course is taught in a workshop format that integrates the material traditionally found in separate lecture and laboratory courses.
4
PHYS-212
University Physics II
This course is a continuation of PHYS-211, University Physics I. Topics include electrostatics, Gauss' law, electric field and potential, capacitance, resistance, DC circuits, magnetic field, Ampere's law, inductance, and geometrical and physical optics. The course is taught in a lecture/workshop format that integrates the material traditionally found in separate lecture and laboratory courses.
4
CHMG-141
General and Analytical Chemistry I
This is a general chemistry course for students in the life and physical sciences. College chemistry is presented as a science based on empirical evidence that is placed into the context of conceptual, visual, and mathematical models. Students will learn the concepts, symbolism, and fundamental tools of chemistry necessary to carry on a discourse in the language of chemistry. Emphasis will be placed on the relationship between atomic structure, chemical bonds, and the transformation of these bonds through chemical reactions. The fundamentals of organic chemistry are introduced throughout the course to emphasize the connection between chemistry and the other sciences.
3
BIOG-140
Cell and Molecular Biology for Engineers I
This is the first course of a two-course sequence designed to introduce biomedical engineering students to the molecular and cellular basis of life with a particular emphasis on the integration of molecular systems that underscore human physiology. This course will start with the basic chemistry of biological macromolecules and then explore the cell starting from the nucleus and moving outward. Major topics will include: DNA replication; molecular basis of inheritance; the biology of RNA; gene expression; protein synthesis; the secretory pathways; and enzyme kinetics.
BIOG-240
Cell and Molecular Biology for Engineers II
This is the second of a two-course sequence designed to introduce biomedical engineering students to the molecular and cellular basis of life with a particular emphasis on the integration of molecular systems in human physiology. This course will continue exploring sub-cellular systems by touring the function of each cellular organelle and describing the pathologic consequences that result from interruption of its normal function. Major topics will include: cellular energy production; the cytoskeleton; the lysosome; the plasma membrane; vesicle transport; cell-cell communication; signaling pathways; the cell cycle; and cell division.
NSSA-245
Network Services
This course will investigate the protocols used to support network based services and the tasks involved in configuring and administering those services in virtualized Linux and Windows internet working environments. Topics include an overview of the TCP/IP protocol suite, in-depth discussions of the transport layer protocols, TCP and UDP, administration of network based services including the Dynamic Host Configuration Protocol (DHCP), Domain Name Service (DNS), Secure Shell (SSH), and Voice Over IP (VoIP). Students completing this course will have thorough theoretical knowledge of the Internet Protocol (IP), the Transport Control Protocol (TCP), and the User Datagram Protocol (UDP), as well as experience in administering, monitoring, securing and troubleshooting an internet work of computer systems running these protocols and services.
CSEC-99
Cooperative Education Seminar
This course helps students prepare for co-operative education employment (“co-op”) by developing job search strategies and material. Students will explore current and emerging aspects of the Computing Security field with employers, alumni and current students who have already been on co-op. Students are introduced to RIT’s Office of Career Services and Cooperative Education and learn about professional and ethical responsibilities for their co-op and subsequent professional experiences. Students will work collaboratively to build résumés and to prepare for interviews.
0
General Education - Ethical Perspective 3
General Education - Social Perspective 3
Cooperative Education (summer)
Third Year
CSCI-462
Introduction to Cryptography
This course provides an introduction to cryptography, its mathematical foundations, and its relation to security. It covers classical cryptosystems, private-key cryptosystems (including DES and AES), hashing and public-key cryptosystems (including RSA). The course also provides an introduction to data integrity and authentication.
3
PUBL-363
Cyber Security Policy and Law
Why are we still so bad at protecting computer systems? Is it because we don’t have good enough technology? Or because we lack sufficient economic incentives to implement that technology? Or because we implement technologies but then fail to use them correctly? Or because the laws governing computer security are so outdated? Or because our legal frameworks are ill-equipped to deal with an international threat landscape? All these reasons—and others— have been offered to explain why we seem to see more and more large-scale cybersecurity incidents and show no signs of getting better at preventing them. This course will examine the non-technical dimensions of this problem—the laws and other policy measures that govern computer security threats and incidents. We will focus primarily on U.S. policy but will also discuss relevant policies in the E.U. and China, as well as international tensions and norms. The central themes of the course will be the ways in which technical challenges in security can be influenced by the social, political, economic, and legal landscapes, and what it means to protect against cybersecurity threats not just by writing better code but also by writing better policies and laws.
3
CSEC-380
Principles of Web Application Security
This course is designed to give students a foundation in the theories and practice relating to web application security. The course will introduce students to the concepts associated with deploying and securing a typical HTTP environment as well as defensive techniques they may employ.
3
CSEC-472
Authentication and Security Models
Access control and authentication systems are some of the most critical components of cybersecurity ecosystems. This course covers the theory, design, and implementation of systems used in identification, authentication, authorization, and accountability processes with a focus on trust at each layer. Students will examine formal models of access control systems and approaches to system accreditation, the application of cryptography to authentication systems, and the implementation of IAAA principles in modern operating systems. A special focus will be placed on preparing students to research and write about future topics in this area.
3
ISTE-230
Introduction to Database and Data Modeling
A presentation of the fundamental concepts and theories used in organizing and structuring data. Coverage includes the data modeling process, basic relational model, normalization theory, relational algebra, and mapping a data model into a database schema. Structured Query Language is used to illustrate the translation of a data model to physical data organization. Modeling and programming assignments will be required. Note: students should have one course in object-oriented programming.
3
Computing Security Electives 1 3
Computing Security Electives 2 3
General Education - Ethical Perspective 3
Free Electives 1 3
Free Electives 2 3
Cooperative Education (summer)
Fourth Year
PHIL-102
Introduction to Moral Issues
This course examines ethical questions that arise in the course of day-to-day individual and social life. Some consideration will be given to ethical theory and its application to such questions, but emphasis will be on basic moral questions and practical issues. Examples of typical issues to be examined are: What are the grounds for moral obligations like keeping promises or obeying the law? How do we reason about what to do? Examples of typical moral issues that may be introduced are capital punishment, euthanasia, abortion, corporate responsibility, the treatment of animals, and so forth.
3
PHIL-202
Foundations of Moral Philosophy
This course is a survey of foundational, and normative, approaches to moral philosophy and their motivating moral questions. Topics will include virtue ethics, deontology, consequentialism, and other approaches. Some of the questions to be examined are: How is human nature related to morality? What are the grounds for moral obligations? Is there an ultimate moral principle? How do we reason about what to do? Can reason determine how we ought to live? What are moral judgments? Are there universal goods? What constitutes a morally worthwhile life? Can morality itself be challenged?
3
PHIL-306
Professional Ethics
This course critically examines ethical issues that arise in professional life. The course will examine not only the general relationship between ethics and professional life but the particular consequences of ethical considerations within the student's own profession and the professions of others with whom the student must live and work.
3
CSEC-490
Capstone in Computing Security
This is a capstone course for students in the computing security program. Students will review a series of short modules on topics such as teamwork, project management, report writing, and presentations, and will work in teams to apply their knowledge and skills to real-world projects in various areas of computing security. Projects may require performing security analysis of systems, networks, and software, etc., devising and implementing security solutions in real world applications.
3
Computing Security Electives 3 3
Computing Security Electives 4 3
Computing Security Electives 5 3
Computing Security Electives 6 3
General Education - Immersion 1 3
General Education - Immersion 2 3
General Education - Immersion 3 3
Open Elective 3 3
Open Elective 4 3

 

Advanced Electives

Students complete the advanced security electives that expand students’ knowledge in one of several disciplines of security, including system security, network security, forensics, malware, secure software development, database and application security, security evaluation, or theory.
 
A matriculated student in the BS in Computing Security is required to take 6 advanced elective courses. Three of the electives must come from one of the four clusters and the other three from the approved general list:

- Network and System Security

- Forensics and Malware

- Software Security, or

- Security Management and Evaluation

 

Currently, RIT Dubai is offering the following advanced courses:

- CSEC 461 Computer System Security (Network and System Security cluster)

- CSEC 462 Network Security and Forensics (Network and System Security cluster)

- CSEC 471 Penetration Testing Frameworks and Methodologies (Network and System Security cluster)

- CSEC 520 Cyber Analytics and Machine Learning (Approved general list of advanced electives)

- CSEC 463 Sensor Network Security (Approved general list of advanced electives)

- CSEC 465 Network & System Security Audit (Approved general list of advanced electives)

 

To graduate, students need to complete all the requirements as listed in the curriculum graduation policy

Program Laboratories

 

Computer Networking Lab

This lab is divided into four clusters. Each cluster has two sub-clusters with three adjacent PCs. A cabinet with at least one server, firewall, two routers, and four switches is dedicated for each of the four clusters. UTP and Console cables are available for students to connect these devices into a LAN, WAN and they can connect the event to the internet to install any additional required software or tool. This lab service mainly some courses such as CSEC 244 routing the switching, CSEC network security, and forensics as well as many other courses.

Read more

Computing Security Lab

The computing security lab provides students with a PC and access to the DTLAB in order to support a wide range of courses. Examples of these courses are penetration testing, security auditing, cyber defense, network forensic, digital forensics, and many more. Through this lab, students can coordinate the work to conduct security experiments that can include building a vulnerable environment, conduct various attacks, acquire information related to these attacks, and then try to mitigate them. Access to the DTLAB provides students with private cloud support that allow them to spin various virtual machines, connect them via a network, and study the various security issues.

Read more

Digital Transformation Lab

The digital transformation lab at RIT Dubai is funded by the TRA ICT fund and was established in 2018. The aim of this lab is in the research and development of secure and smart solutions across a number of verticals that support digitization for government, enterprise, and education.

Read more

Advisory Board

Mr. Eyad Shihabi
BT - MD, Natural Resources & Utilities at BT

Mr. Taha Khalifa
Intel Corp - Regional GM, MENA

Dr. Ayman El Nashar
Emirates Integrated Telecommunications (du) - Senior Director

Mr. Ghanim Al Falasi
Dubai Silicon Oasis Authority - Senior VP

Ms. Diyaa Zebian
Archinnova - Executive Partner

Mr. Bashar Kilani
Accenture - MD Digital Economy

Ms. Ghada Elkeissi
AWS - Head of Professional Services, ME & Africa

Dr. Mahmoud Sherif
Emirates Integrated Telecommunications (du) - Head of Technology & IT Strategy

Dr. Raed Shubair
UAE Ministry of Education, NYU-AD – Senior Advisor, Office of Undersecretary for Academic Affairs of Higher Education Research Affiliate, MIT Adjunct Professor, NYU-Abu Dhabi

Website last updated: June 27, 2024